Secure publishing of data to DMZ using virtual hard drives
First Claim
1. A method for secure publishing of data from a first physical computer to a DMZ resident virtual computer hosted on a second physical computer using a virtual hard disk, the method comprising:
- storing a data file in memory on the first physical computer, the first physical computer being coupled to a first network, the data file containing data;
transferring the data to the DMZ resident virtual computer hosted on the second physical computer as a virtual hard disk on the second physical computer, via a first network interface card (NIC) coupled to the second physical computer and to the first network and not to a second network,the second physical computer having an operating system configured to be unable to communicate using a second NIC, andthe DMZ resident virtual computer having a root partition configured in a manner that limits devices seen by the root partition and disables communication of the DMZ resident virtual computer with the first NIC based on the limited devices seen by the root partition;
detecting presence of the virtual hard disk by the DMZ resident virtual computer;
mounting of the virtual hard disk by the DMZ resident virtual computer; and
publishing the data to the second network via the second NIC.
2 Assignments
0 Petitions
Accused Products
Abstract
A secure DMZ-resident computer that cannot connect to the internal network while allowing data to be transferred to and from the DMZ-resident computer is disclosed. The mechanism may include the transference of virtual hard disk files between the internal network and the DMZ host computer. The DMZ host computer may be configured with two network interface cards (“NICs”). One NIC may be connected to the DMZ network. The other NIC may be connected to the internal network. The virtual machines are connected only to the DMZ NIC. The physical host communicates only with the internal network NIC. When it is necessary to publish data to the DMZ-resident computer, a virtual hard disk file may be copied to the DMZ host over the internal network NIC. The DMZ resident virtual computer simply detects the presence of the new drive and mounts it.
12 Citations
20 Claims
-
1. A method for secure publishing of data from a first physical computer to a DMZ resident virtual computer hosted on a second physical computer using a virtual hard disk, the method comprising:
-
storing a data file in memory on the first physical computer, the first physical computer being coupled to a first network, the data file containing data; transferring the data to the DMZ resident virtual computer hosted on the second physical computer as a virtual hard disk on the second physical computer, via a first network interface card (NIC) coupled to the second physical computer and to the first network and not to a second network, the second physical computer having an operating system configured to be unable to communicate using a second NIC, and the DMZ resident virtual computer having a root partition configured in a manner that limits devices seen by the root partition and disables communication of the DMZ resident virtual computer with the first NIC based on the limited devices seen by the root partition; detecting presence of the virtual hard disk by the DMZ resident virtual computer; mounting of the virtual hard disk by the DMZ resident virtual computer; and publishing the data to the second network via the second NIC. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system for secure publishing of data to DMZ using a virtual hard drive, the system comprising:
-
a content server in communication with an intranet; and a DMZ host server comprising an intranet-facing network interface card (NIC) via which the DMZ host server is enabled to communicate over the intranet with the content server, and an Internet-facing NIC via which the DMZ host server is enabled to communicate over the Internet, the DMZ host server hosting a virtual computer, the virtual computer having a root partition configured in a manner that limits devices seen by the root partition and disables the communication of the virtual computer with the intranet-facing NIC based on the limited devices seen by the root partition and configured to communicate over the Internet using the Internet-facing NIC, the virtual computer detecting presence of the virtual hard disk, the virtual computer mounting the virtual hard disk, the data published to the intranet network via the intranet-facing NIC, and the DMZ host server having an operating system that is configured to lack access to the Internet-facing NIC. - View Dependent Claims (13, 14, 15, 16, 17)
-
-
18. A physical device comprising:
-
a DMZ resident virtual computer hosted on the physical device; a processor; and a memory coupled to the processor, the memory having stored thereon executable instructions that when executed by the processor cause the processor to effectuate operations comprising; receiving data on the physical device as a virtual hard disk via a first network interface card (NIC) coupled to the physical device and to a first network and not to a second network, second physical computer having an operating system configured to be unable to communicate using a second NIC, and the virtual machine having a root partition configured in a manner that limits devices seen by the root partition and disables communication of the DMZ resident virtual computer with the first NIC based on the limited devices seen by the root partition; detecting presence of the virtual hard disk by the DMZ resident virtual computer; mounting of the virtual hard disk by the DMZ resident virtual computer; and publishing the data to the second network via the second NIC. - View Dependent Claims (19, 20)
-
Specification